It is possible, but it requires some setup. Here is how it is done, and how you can tell.
On a corporate computer, where software updates are pushed from a central location, it is possible to send to your computer a "trusted" certificate that will be stored next to the trusted certificate of say, Verising or Entrust.
Your company's proxy will hold the private key of that certificate.
When you visite a HTTPS web site, like https://mybank.com/, the proxy will put itself in the middle. It will establish a HTTPS connection with your browser generating on the fly a certificate for mybank.com. It will replay (and possibly monitor or log) all you traffic on a new connexion, from the proxy to mybank.com.
You can tell if this is the case by looking at the padlock icon. If you see that the certificate for mybank.com was issued by acmesprockets.com (yourthe name of your company), then you know they can see your "encrypted" traffic. YouBut since you company can also check with aforce your computer on another networkto trust any certificate, they could create a certificate using a well known name, like "Entrust.net Secure Server Certification Authority" (at homeeven if that would probably be illegal under some trademark law) and compare the results.
I know that BlueCoat supportsSo how can you tell? After connecting to the website, look at the certificate. Details vary for each browser, but clicking on the padlock icon next to https is usually the place to start. From that configurationcertificate, and I'm sure othersfind the certificate thumbprint and look it up online. Better yet, do the same thing with the certificate authority. If you don't find the certificate thumbpring online (but you can when you are at home or on your phone), toochances are your HTTPS traffic is decrypted along the way.